CVE-2017-18349
CRITICAL EXPLOITED NUCLEIFastjson Insecure Deserialization - Remote Code Execution
Title source: nucleiDescription
parseObject in Fastjson before 1.2.25, as used in FastjsonEngine in Pippo 1.11.0 and other products, allows remote attackers to execute arbitrary code via a crafted JSON request, as demonstrated by a crafted rmi:// URI in the dataSourceName field of HTTP POST data to the Pippo /json URI, which is mishandled in AjaxApplication.java.
Exploits (1)
Nuclei Templates (1)
Fastjson Insecure Deserialization - Remote Code Execution
CRITICALVERIFIEDby night
Scores
CVSS v3
9.8
EPSS
0.8890
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2024-01-22
CWE
CWE-20
Status
published
Products (4)
alibaba/fastjson
< 1.2.25
com.alibaba/fastjson
0 - 1.2.31Maven
pippo/pippo
1.11.0
ro.pippo/pippo-fastjson
0 - 1.12.0Maven
Published
Oct 23, 2018
Tracked Since
Feb 18, 2026